CLOUD CYBERSECURITY THREAT RECOGNITION AND DETECTION SYSTEM
Today, cybersecurity has become an obligation for every service provider. While there are groups of people-oriented to exploit services for malicious purposes, others develop tools and mechanisms to defend them. The present work is oriented to this last group. The uses of machine learning are dissimilar and varied. The capabilities of the algorithms used to allow their integration with the cybersecurity field. As a paradigm of the current context, cloud services have become the target of cyberattacks, but their potential can also be used to deal with them. Based on this, a cloud solution is offered to use machine learning in cybersecurity.
How to Cite
The authors who publish in this journal agree to the following terms:
- The authors retain the copyright and guarantee to the journal the right to be the first publication of the work are distributed under a license of use and distribution "Creative Commons Attribution-NonCommercial-NoDerivativeWorks 3.0 Unported" (CC BY-NC-ND 3.0) You can consult from here the informative version and the legal text of the license that allows others to share the work with an acknowledgement of the authorship of the work and the initial publication in this journal.
- Authors may separately enter into additional agreements for non-exclusive distribution of the version of the work published in the journal (for example, placing it in an institutional repository or publishing it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are allowed and encouraged to disseminate their work electronically (e.g., in institutional repositories or on their own website) before and during the submission process, as this can lead to productive exchanges as well as earlier and greater citation of published work (see The Effect of Open Access).